Introduce some problems with social media

Assignment Help Basic Computer Science
Reference no: EM13916769

Intro

Introduce some problems with social media that have negatively impacted the academic performance of college students.  Social media has created several social problems that have changed the way college students live.

Thesis: With the introduction of social media, the way college students spend their time and study has changed drastically and in doing so, it has had a negative impact on their academic performance which has led to reduced learning and research capabilities, time wastage, and declining of health.

Body 1: Reduced Learning and Research Capabilities

Students have now started to rely more and more on the information that is more easily accessible on the social media sites.  This reduces actual learning and researching time and increases the dependency of information on social media.

Body 2: Time Wastage

While students are studying online or researching for information, they tend to check in on their social media sites and they get sidetracked and before long they forget what they were doing in the first place.  This is a waste of their time and leads to late assignments.

Body 3: Declining of Health

College students that are excessively using the social media sites are so caught up in their online activities that they do not eat their meals on a regular basis and they do not get enough sleep at night.  They rely on energy drinks and highly caffeinated drinks to stay away which eventually starts to negatively affect their health.

Conclusion: 

Restate thesis and draw a conclusion from what was discussed in the body paragraphs.

https://www.columbiachronicle.com/health_and_tech/article_aa2daa9a-d7e4-11e3-9286-001a4bcf6878.html

Reference no: EM13916769

Questions Cloud

Does the video sound as if webex would work for your team : Watch the video tour. Take notes and report what you learn. Does it sound as if WebEx would work for your team? In class discussion or in a memo, describe how WebEx works.
What are the five generic competitive strategies : What are the five generic competitive strategies? Briefly describe each one and identify the type of competitive advantage that each strategy is aimed at achieving.
Investment expenses : Rich and Shauna Nielson file a joint tax return, and they itemize deductions. Assume their marginal tax rate on ordinary income is 25 percent. The Nielsons incur $2,400 in miscellaneous itemized deductions, excluding investment expenses.
Describe how relational databases are used in olap analysis : Describe how relational databases are used in OLAP analysis, data mining, and E-commerce website applications.
Introduce some problems with social media : Introduce some problems with social media that have negatively impacted the academic performance of college students.  Social media has created several social problems that have changed the way college students live.
Calculate the mean of this frequency distribution : What percentage of the checkout times was at least 4 minutes? Calculate the mean of this frequency  distribution. Calculate the standard deviation of this frequency distribution
What industry conditions of perfectly competitive industry : What industry meets the conditions of a perfectly competitive industry and how the individual firms would respond to an increase in the market demand for the product.
What makes that person a good listener : Who is the best listener you know? What makes that person a good listener? Be prepared to discuss your responses in class, with your team, or in a memo to your instructor.
What amount of goodwill should be reported : Samson is a separate cash-generating unit and reporting unit. At the end of Year 1, Bartholomew compiles the following information for Samson.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Problem regarding the exception handling

First, create three exception classes named NumberHighException, NumberLowException, and NumberNegativeException. Both NumberHighException and NumberLowException should be directly subclassed from the Exception class

  Write a complete main method that would print your last name

Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, followed by a space and your first name. Question 2 Declare a variable named myMenu suitable for holding references to Menu o..

  What in the history of programming languages

What, in the history of programming languages, motivated the development of Java? Answer it more than 250 words.

  What are different modes of circuit and packet-switched

Companies are looking at many options to get better service for their telecommunications needs. What are different modes of circuit and packet-switched networks? What are the common types of methods for using these networks, such as DSL, ATM, and so ..

  Designing the most secure network possible

Designing the most secure network possible

  Remote access for small offices and teleworkers

Case Study 2: Cisco's Remote Access Go to Cisco's Website and read, "How Cisco IT Provides Remote Access for Small Offices and Teleworkers", located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the glo..

  Apple versus samsung

Apple iPads continue to be successful. The Samsung Galaxy Tab is one (1) of iPad's competitors. Use the Internet and Strayer Library to research the advantages and disadvantages of these devices and to determine if they are comparable.

  The iso network management model helps it managers

The ISO Network Management Model helps IT managers

  What is an integer overflow error

What is an integer overflow error? What happens when an integer overflow error occurs? Describe the behavior of the program. Why is multiplication particularly risky for integer overflow errors

  Dalvik virtual machine

Explain the similarities and differences of the Dalvik virtual machine and the .NET CLR in more detail. Which one is better? Describe your answer.

  Write a boolean method

A random walk begins at a point and repeatedly takes a step in a randomly chosen direction. In our version, the random walk will start at the center of a circle and continue until it goes outside the circle.

  Physical security

As you've learned, physical security doesn't just mean securing systems. It also involves securing the premises, any boundaries, workstations, and other areas of a company. Without physical security, data could be tampered with or stolen, and value i..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd